keklick1337 / honeypot-serviceLinks
Honeypot Service Simulator
☆23Updated last year
Alternatives and similar repositories for honeypot-service
Users that are interested in honeypot-service are comparing it to the libraries listed below
Sorting:
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆161Updated 5 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 weeks ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆185Updated last year
- Cyber threat intelligence tool suite.☆42Updated 7 months ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆145Updated 3 weeks ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆162Updated last week
- A rigorous IoT scanner based on Shodan.io☆68Updated 10 months ago
- An Nmap XSL implementation with Bootstrap. Allows Nmap XML port scan results to be converted into beautiful HTML reports.☆82Updated 3 months ago
- Finding ClickFix and FakeCAPTCHA like it's 1999☆104Updated last week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆184Updated 9 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 11 months ago
- DShield Sensor Log Collection with ELK☆43Updated this week
- ☆67Updated last week
- 🖥️ Windows 🚀 A Windows tool for emergency privacy: instantly deletes sensitive data and active logins to protect my information during …☆53Updated 4 months ago
- NMapify is a Python tool that creates mind maps to visualize network layouts using Nmap. It also generates test cases for each identified…☆58Updated 6 months ago
- A simple vulnerability scanning application built with FastAPI. vulnerability-scanner open-source-security nmap-cve SIEM☆30Updated last month
- Signature based honeypot detector tool written in Golang☆106Updated 8 months ago
- ☆74Updated last week
- Your Swiss Army knife to analyze malicious web traffic based on mitmproxy.☆63Updated 3 months ago
- God Mode Detection Rules☆134Updated last year
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆471Updated last week
- The Eventlog Compendium is the go-to resource for understanding Windows Event Logs.☆49Updated 7 months ago
- SECurityTr8Ker monitors the SEC's RSS feed for 8-K filings with cybersecurity incident disclosures.☆90Updated 5 months ago
- Assortment of scripts and tools for our Blackhat EU 2024 talk☆100Updated 9 months ago
- 🛡️ VIPER: Stay ahead of threats with AI-driven vulnerability intelligence. Prioritize CVEs effectively using NVD, EPSS, CISA KEV, and Go…☆79Updated 3 months ago
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated last month
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated 10 months ago
- Inboxfuscation is an advanced offensive & defensive framework for mailbox rule obfuscation and detection in Exchange environments.☆79Updated 2 months ago
- MCP server for Atomic Red Team☆59Updated 2 weeks ago
- NoDelete is a tool that assists in malware analysis by locking a folder where malware drops files before deleting them.☆48Updated this week